Call for Papers: Creating Smart Managerial Dashboards

You are here

Call for Papers

Below is the call for papers for the upcoming Cutter IT Journal issue Mobile Security: Managing the Madness guest edited by Sebastian Hassinger.

As mobile computing has made sophisticated, digitally-mediated interactions possible in both personal/consumer and business-like capacities (BYOD) – the market and the challenges associated with it have exploded.

Taking a step back to when the technologies that underpin mobile computing and networking were developed, it was assumed that each user had some level of expertise, that the use cases were quite limited in scope, and that the overall numbers of users were constrained. Fast-forward to present day, the massive scale of mobile computing adoption, the broad scope of supported use cases, and the "naive" user base has created a number of serious issues that the IT industry must grapple with now. Chief among these problems is mobile security.

The subject of mobile security has never been more in the public spotlight than now, with most of the recent attention centered on pilfered celebrity pictures. Hosting services like Apple's iCloud were blamed, but regular non-celebrity images have also been compromised via apps and services like the "ephemeral" Snapchat. Private pictures are the tiniest tip of the iceberg now that every mobile device is potentially accessing all manners of financial, health, and other sensitive personal information.

Meanwhile in the enterprise, mobile devices are rapidly over taking PC usage providing employees the convenience of using their mobile devices to perform their jobs wherever and whenever they see fit. This has given rise to a whole new set of challenges as business data and systems can be accessed anywhere/anytime. The benefits of BYOD are vast, as are the risks.

An upcoming issue of Cutter IT Journal will address mobile security from a practical perspective, analyzing the major features of the mobile security landscape and providing practical guidance on steps that can be taken to mitigate the major risks at both the organizational and individual level.

Topics may include, but are not limited to, the following:

  • Is mobile security any different than regular security in a PC or Internet context?

  • What are some threats that are unique to mobile, like baseband OS attacks?

  • What is the more vulnerable attack point -- the device or the cloud services that support them?

  • What are the best practices for building a secure mobile application?

  • What have we learned from recent privacy breaches that can inform our own mobile security "hygiene?"

  • In the era of BYOD, how does enterprise IT deal with mobile security?

TO SUBMIT AN ARTICLE IDEA

Please respond to Sebastian Hassinger at shassinger[at]cutter[dot]com, with a copy to cgenerali[at]cutter[dot]com and include an extended abstract and a short article outline showing major discussion points.

ARTICLE DEADLINE

Accepted articles are due by 14 November 2014.

EDITORIAL GUIDELINES

Most Cutter IT Journal articles are approximately 2,500-3,000 words long, plus whatever graphics are appropriate. If you have any other questions, please do not hesitate to contact CITJ's Group Publisher, Christine Generali at cgenerali[at]cutter[dot]com or the Guest Editor, Sebastian Hassinger at shassinger[at]cutter[dot]com. See the editorial guidelines.

Important Note: When you submit an article to Cutter Consortium, you warrant that you (or your employer) are the sole owner of the article and that you have full power and authority to copyright it and publish it. Also, the article you submit to Cutter must be an original; not previously published elsewhere.

AUDIENCE

Typical readers of Cutter IT Journal range from CIOs and vice presidents of software organizations to IT managers, directors, project leaders, and very senior technical staff. Most work in fairly large organizations: Fortune 500 IT shops, large computer vendors (IBM, HP, etc.), and government agencies. 48% of our readership is outside of the US (15% from Canada, 14% Europe, 5% Australia/NZ, 14% elsewhere). Please avoid introductory-level, tutorial coverage of a topic. Assume you're writing for someone who has been in the industry for 10 to 20 years, is very busy, and very impatient. Assume he or she will be asking, "What's the point? What do I do with this information?" Apply the "So what?" test to everything you write.

PROMOTIONAL OPPORTUNITIES

We are pleased to offer Journal authors a year's complimentary subscription and five copies of the issue in which they are published. In addition, we occasionally pull excerpts, along with the author's bio, to include in our weekly Cutter Edge e-mail bulletin, which reaches another 8,000 readers. We'd also be pleased to quote you, or passages from your article, in Cutter press releases. If you plan to be speaking at industry conferences, we can arrange to make copies of your article or the entire issue available for attendees of those speaking engagements -- furthering your own promotional efforts.

ABOUT CUTTER IT JOURNAL

No other journal brings together so many cutting-edge thinkers, and lets them speak so bluntly and frankly. We strive to maintain the Journal's reputation as the "Harvard Business Review of IT." Our goal is to present well-grounded opinion (based on real, accountable experiences), research, and animated debate about each topic the Journal explores.

PLEASE FORWARD THIS CALL FOR PAPERS TO ANYONE WHO MIGHT HAVE AN APPROPRIATE SUBMISSION.

Philip O'Reilly
Article

Beyond Fintech: New Frontiers — Opening Statement

by Philip OReilly

This issue focuses on key topics of interest for financial services organizations, namely equity crowdfunding, legacy systems migration, robo-advisors, test outsourcing, and refining the reconciliation process.


Bhardwaj Velamakanni
Advisor

Implementing Design Thinking in Agile

by Bhardwaj Velamakanni

This Advisor presents an overview of improving Agile techniques and practices by using design thinking within the Agile space and describes three techniques from design thinking methodologies that tend to yield benefits to Agile practitioners.


Gustav Toppenberg
Executive Update

Data’s Story: An Enterprise Asset in the Digital Backbone

by Gustav Toppenberg

The existence of a digital backbone in an organization means that anyone aspiring and planning to transform different parts of the enterprise can leverage the digital backbone in a consistent and sustainable way, ensuring that each transformation effort connects and leverages a common platform. Digital transformation leaders are starting to realize that a powerful digital services backbone to facilitate rapid innovation and responsiveness is key to successfully executing on a digital strategy.


Effort score and priority rank for requirements in our sample project.
Executive Summary

Can We Measure Agile Performance with an Evolving Scope? An EVM Framework (Executive Summary)

by Alexandre Rodrigues

Can a method like EVM, developed to control projects with well-defined objectives, be applied to control product development initiatives that evolve continuously toward a “moving target”? In an Agile environment, we are faced with the dynamic evolution of a finite boundary of integrated scope, cost, time, and resources; this finiteness — essential for business management and decisions — is the cradle for project management techniques, tools, methods, and frameworks. The EVM method was first developed to help with managing complex R&D projects mostly characterized by an unstable, volatile, and evolving scope. It is therefore no surprise that EVM applies to Agile projects.


Article

The Frontier of Fintech Innovation — Opening Statement

by Philip OReilly

It’s a pleasure for me to introduce the first of two special issues of Cutter Business Technology Journal (CBTJ) showcasing the thought leadership and cutting-edge research and development (R&D) being done in State Street Corporation’s Advanced Technology Centres in Europe, the Middle East, and Africa (EMEA) and Asia Pacific (APAC), in partnership with University College Cork (UCC) and Zhejiang University (ZJU), respectively. The articles in this issue represent a small sample of the output from the R&D undertaken in these centers, which combine academic excellence with real industry impact.


Executive Update

Business Architecture’s Role in Crisis, Risk, and Compliance Management

by William Ulrich

Every business must deal with crisis, risk, and compliance challenges. Teams chartered with addressing these challenges are often split across business units and regions, which fragments crisis, risk, and compliance management efforts. Business unit silos and related complexities obscure ecosystem transparency, which in turn constrain an organization’s ability to identify risks, assure compliance, and prevent and disarm crises. Business architecture delivers business ecosystem transparency as a basis for improving a business’s ability to collectively address challenges related to crisis, risk, and compliance. 


Curt Hall
Advisor

Building New Business Models with Blockchain

by Curt Hall

Organizations are using blockchain to create new business models — exploiting its capabilities for optimizing contract management, financial transaction management, and identity management.


Nine Policy Recommendations for Managing Technical Debt
Executive Update

Managing Technical Debt: Nine Policy Recommendations

by Rick Brenner

For technology-dependent products, companies, institutions, and even societies, sustainability depends on learning how to manage technical debt. Like most transformations, incorporating new practices into our organizations will likely be an iterative process. We already recognize the problem, and researchers are making progress, albeit mostly on technical issues. This Executive Update proposes a policy-centered approach to the problem. It begins with a principle that can serve as a guide for constructing technical debt management policy, and then shows how to apply that principle to develop nine recommendations that enable organizations to manage technical debt effectively.


Bhardwaj Velamakanni
Advisor

Emerging Agile Anti-Patterns

by Bhardwaj Velamakanni

Agile methodologies, however popular they are, bring their own sets of “smells” and anti-patterns to the table, sometimes causing irreparable damage to the team. While the sources of these smells are many, one of the primary culprits is the mindset that treats Agile as “yet another methodology,” totally ignoring the cultural aspect. This article throws light on some of the prominent smells that are emerging of late in the Agile world.


Jens Coldewey
Advisor

Middle Management in Flux

by Jens Coldewey

If you start changing an organization toward an Agile mindset, there’s no real end. Agile is about creating an organization of continuous learning and the transformation is done when there is nothing new to learn, which will probably be never. This puts an enormous challenge on middle management.


Article

Business Opportunities in the New Digital Age — Opening Statement

by San Murugesan

The articles in this issue present perspectives and ideas on business transformation in the digital age. We hope they will inspire and encourage you to visualize the likely future of business in your domain and to explore the opportunities it presents. Finally, we hope their insights will help you identify suitable transformation strategies and plans and, if needed, choose viable collaboration models for partnering with startups and other firms in your digital business efforts.


Advisor

Unlocking Value from Digital Initiatives

by Joe Peppard, by John Thorp

Beyond buzzwords, what we are seeing is a seismic shift in the role of technology in organizations. Technology is more and more embedded in everything we do as we move into an increasingly hyper-connected digital world, a world in which technology is driving significant social, organizational, and industry change.


Digital Data Steams impact bottom line
Webinar

Improve Customer Experience — Leverage Your Digital Data Streams

by Federico Pigni, by Gabriele Piccoli

In this on-demand webinar, you'll discover the strategic and tactical opportunities made possible by Digital Data Streams and the opportunities for improved customer experience made possible by DDS.


Lou Mazzucchelli
Advisor

Why Are They Twittering? A Modest Proposal

by Lou Mazzucchelli

At the Cutter Digital Transformation & Innovation Bootcamp, Cutter Fellow and Harvard Business School Professor Karim Lakhani talked about digitally-driven disruption of traditional business models for value creation and capture, discussing platform models like Facebook and Twitter. To date, Twitter has clearly done a good job “creating value.” But unlike Facebook, it continues to struggle with the capture part of the equation.


social collaboration
Executive Update

Seven Ways to Gamify Social Collaboration

by Phaedra Boinodiris

Social collaboration is not about technology. It’s about connecting people, and it’s changing the way business is being conducted. Similarly, gamification is not about games. It’s about motivating the per­sonal and professional behaviors that drive business value. Together, social collaboration and gamifi­cation help companies reap great benefits — among them, the ability to deepen customer relationships, drive operational efficiencies, and optimize their workforce. 


Figure 1 — Tracing a roadmap to projects.
Advisor

Using Roadmaps Strategically

by Roger Evernden

Roadmaps have two key functions in strategy planning. The first is to outline planned architectural changes that will deliver the required strategies; the second is to outline alternative ways to achieve the same results.


Article

Technology Trends, Predictions, and Reflections 2017: Opening Statement

by Cutter Team

Just as recent global events have given us reason to pause and reflect, the pace of technology emergence and disruption is proving to be a source of inspiration and uncertainty. Transitioning to a digital world is front-of-mind for many business executives, yet finding the right path is an ongoing challenge. So we asked Cutter’s team of experts for their insights on some of the technologies, trends, and strategies that will be relevant in 2017 and beyond. In typical Cutter Business Technology Journal fashion, our call produced a wide range of opinions and reflections worthy of consideration as you chart your business technology journey for the new year.


Article

AGI: A Threat, an Opportunity, or an Inevitable Unknown for 2017?

by Alexandre Rodrigues

Artificial general intelligence (AGI) is currently emerging as an area where recent developments are likely to have a major impact on the way organizations do business, societies organize themselves, and even on how we address values and ethics.

The fact is that AGI already exists in our daily life. A common example is the GPS systems present in many new cars manufactured today; and let’s not forget the drones being used to deliver pizzas and cars that drive themselves. While automatic pilots have been used in commercial planes for quite some time, what AGI is about to offer to general business and human activity is well beyond what most of us have seen so far.


Article

The Tech-Driven Tech Backlash

by Carl Pritchard

2017 is going to be a year of strange winners, and perhaps the strangest of all will be a giant leap away from technology and back to solutions that don’t rely on 24/7 connectivity. With the onslaught of major hacks and Facebook embarrassment, the antitech crowd may have its best year in decades. 


Article

Rapid Technology Innovation in Blockchain: Should You Be on the Front Lines?

by Nate OFarrell

One of the most prevalent blockchains in the world, Ethereum, is poised to switch from a proof-of-work (POW) algorithm to a proof-of-stake (POS) algorithm, likely in 2017, with the release of the Casper codebase. Why does this matter? Because blockchain technology is becoming increasingly relevant and prevalent in businesses across the globe. It holds great potential to disrupt how businesses perform basic transactions, from payments, to programmable, self-executing contracts, to identity verification.